Protect from Spam

Spam, also known as unsolicited bulk email, junk mail, or unsolicited commercial email, is the practice of sending unwanted email messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients.

If spammers managed to obtain your KelaniNet ID and the password, they will use your email account to send spam mail. They could also access your emails.

It is difficult to determine exactly how spammers gather email addresses because there are so many ways to do it. Popular methods include: getting email addresses from chat rooms, from Usenet postings, unsecure email lists, and "mailto" links on Web pages.

Sometimes spammers get email addresses by mailing to common names or common words used in email addresses. They may also keep databases by known Internet domain names. They constantly probe that domain for real email addresses. There are known viruses that will send email to all the addresses in your email program address book. It would be difficult to prevent others knowing your email address. However, you could protect your email account by protecting your KelaniNet ID and password.

Spammers are becoming more and more sophisticated in their emailing techniques, and sometimes disguise the sender information. These techniques make it almost impossible to determine where the spam came from.

How can you quickly identify a message as a phishing attempt? 

Email address does not match university name.

Hovering mouse over 'CLICK HERE' link does not match university name.

Poor grammar.

The site you visit after clicking the given link does not contain “kln.ac.lk”, university logo, “University of Kelaniya” title, etc.

If you have any doubts, please contact the IT HelpDesk (444 - intercom, 0112 903 444 - outside of university, This e-mail address is being protected from spambots. You need JavaScript enabled to view it - email) immediately.

If you received an email like this, please ignore and delete it. This is a phishing attempt.

Take note of this important update that our new web mail has been improved with a new messaging system from zimbra which also include faster usage on email, shared calendar, and web documents. Please use the link below to complete your update for our new zimbra improved web mail.

***Click on this link**

<http://princewillsinvestment.com/components/com_user/Zimbra/Zimbra/zimbra.html>*


Thank you.

ICT Centre

University of Kelaniya



Please contact one of the following members of staff

Mr. Sandun Fernando (Asst. Network Manager) 071 7037852

Mr. Thilina Pathirana (Asst. Network Manager) 071 6246331

Dr. Dhammika Weerasinghe (Director/ ICT Centre) 071 9607455

Please contact them only during an emergency

Spam filters could be used to filer spam mail. However, please note that there is no proper technical solution for spamming and tricking users to provide password. The best solution is user awareness and users taking precautions to protect their KelaniNet ID and password.

The only email address the ICT Centre use to communicate with users is This e-mail address is being protected from spambots. You need JavaScript enabled to view it . Please check the sender's email address to verify authenticity of the email. If you receive any email from any other address regarding services, changing passwords, etc., please ignore it.

The ICT Centre never ask for your Kelani Net ID and Password via email. The only way of changing the password of your account is to visit the following link.

https://ad.kln.ac.lk

If you forgot or want to reset your password, please contact the IT HelpDesk to obtain a temporary password.

If you forget or lost your password, there is no way of recovering your password as we do not keep your password in our records.

The ICT Centre could issue a temporary password and you could change it by visiting https://ad.kln.ac.lk. This is the only way  to reset your account’s password.

Email
If you receive multiple messages from the contacts in your address book, saying that they received spam email from your address, then your email account may have been hacked.
Note: Spam can be sent to random people and look as if it’s coming from you, but it’s actually coming from somewhere else ("spoofing"). However, if you are getting multiple reports from people that are listed in your contacts, someone/something may have gained unauthorized access to your account.

Computer
A successful attack on your computer may be difficult to discover.
A couple indicators may be:
An abnormal increase in internet or network activity. This often manifests as slow downloads or slow internet access when you know that you’re not doing anything particularly demanding.

Your computer may be being accessed remotely. This requires awareness of normal activity. A slow internet connection maybe harmlessly related to your ISP, your internet connection, or the sites that you’re visiting.

Unexpected disk activity. A hacker/malware may be accessing files or programs on your computer. Again, this requires awareness of normal activity.

Note: When you are not actively using the computer or network, programs like the indexing service and backup utilities may be running in the background and accessing disks and the network.
The best advice is to follow common best-practices: regularly install updates, use a firewall, use current anti-malware software and be careful what you click on or download.

Facebook and social media
Your Facebook or social media account may compromised if posts appear on your Facebook wall or elsewhere that look like they are from you, but you did not submit them.

Note: Liking a page on Facebook, playing social media games, and sharing via social media can reasonably result in unintentional consequences. It is important to look for posts that could only have been submitted by you and yet you know that you didn’t submit them.
If you believe any of your accounts have been compromised, change your password and recovery settings immediately.
In general, the following will help you better secure whatever system you have.
Do not install unknown programs.
Keep up with system patches, and keep the operating system itself up to date.
Stop all running services which you don't intend to use on the system.
When installing a system, limit network exposure until after you've patched and secured it.
Use good passwords, the longer and more non-alphabetic the better. Change them often.
Use secure transport methods and encryption.